The Elliptic package 6.5.5 for Node.js for EDDSA implementation does not perform the required check if the signature proof(s) is within the bounds of the order n of the base point of the elliptic curve, leading to signature malleability. Namely, the verify
function in lib/elliptic/eddsa/index.js
omits sig.S().gte(sig.eddsa.curve.n) || sig.S().isNeg()
validation.
This vulnerability could have a security-relevant impact if an application relies on the uniqueness of a signature.
{ "nvd_published_at": "2024-10-10T01:15:11Z", "cwe_ids": [ "CWE-347" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-10-10T21:00:04Z" }